Unlock instant, AI-driven research and patent intelligence for your innovation.

System identification method based on survival port

A system identification and port technology, applied in the field of network security, can solve problems such as increasing difficulty in judging the needs, system type, and failing to receive a response from the ping target IP, achieving the effect of accurate identification

Active Publication Date: 2021-10-19
北京华云安信息技术有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, judging the system type by the TTL value, when there is a firewall or security software, the ping target IP will not receive a response; when using scripts to implement ICMP ping packets, administrator privileges are required; at the same time, the TTL value can also be modified. Artificial modification further increases the difficulty of judging the system type

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System identification method based on survival port
  • System identification method based on survival port
  • System identification method based on survival port

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0040] In addition, the term "and / or" in this article is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean: A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character " / " in this article ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a system identification method and device based on a survival port, equipment and a computer readable storage medium. The method comprises the following steps: performing port detection on a target machine, and determining the survival state of each port in the target machine; generating a code according to the survival state of each port in the target machine, wherein the code is used for marking the survival state of the port; and inputting the code into a system identification model trained through a supervised learning algorithm to obtain an output system type of the target machine. In the way, accurate recognition of the system type is achieved.

Description

technical field [0001] Embodiments of the present disclosure generally relate to the technical field of network security, and more specifically, relate to a system identification method, device, device and computer-readable storage medium based on surviving ports. Background technique [0002] Existing technologies for identifying system types are mainly based on Ping of the ICMP protocol, sending ICMP packets, and making a rough judgment of the system by checking the returned TTL value. [0003] However, judging the system type by the TTL value, when there is a firewall or security software, the ping target IP will not receive a response; when using scripts to implement ICMP ping packets, administrator privileges are required; at the same time, the TTL value can also be modified. Artificial modification further increases the difficulty of judging the system type. Contents of the invention [0004] According to an embodiment of the present disclosure, a system identificat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26G06N20/20G06N20/10G06N20/00G06N5/00G06N3/08
CPCH04L43/0805G06N20/00G06N20/10G06N20/20G06N3/08G06N5/01
Inventor 刘加勇朱林白兴伟刘加瑞
Owner 北京华云安信息技术有限公司